SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Presented By-Rahul Singh
CSE 3rd Year
College-Nitra Technical Campus Ghaziabad
Linkedin - https://www.linkedin.com/in/rahul-singh-
171b77156/

Outline-
 1. Introduction
 2. Biometrics
 3. History
 4. Facial Recognition
 5. Implementation
 6. How it works
 7. Strengths & Weaknesses
 8. Applications
 9. Conclusion
 10. Refrences
Introduction
 Everyday actions are increasingly being
handled electronically, instead of pencil and
paper or face to face.
 This growth in electronic transactions
results in great demand for fast and accurate
user identification and authentication.
Biometrics
 A biometric is a unique, measurable characteristic of a
human being that can be used to automatically
recognize an individual or verify an individual’s
identity.
 Biometrics can measure both physiological and
behavioral characteristics.
 Physiological biometrics:- This biometrics is based on
measurements and data derived from direct
measurement of a part of the human body.
 Behavioral biometrics:- this biometrics is based on
measurements and data derived from an action
Type of biometrics
What is face recognition system ?
 A facial recognition system is a technology
capable of identifying or verifying a person
from a digital image or a video frame from
a video source.
 It requires no physical interaction on
behalf of the user.
 It is accurate and allows for high
enrolment and verification rates.
 It can use your existing hardware
infrastructure, existing camaras and image
capture Devices will work with no
problems
History
 In 1960s, the first semi-automated system for facial
recognition to locate the features(such as eyes, ears,
nose and mouth) on the photographs.
 In 1970s, Goldstein and Harmon used 21 specific
subjective markers such as hair color and lip thickness
to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear
algebra technique, to the face recognition. 03/12/13 8
Facial Recognition
 VERIFICATION- The system compares the given
individual with who they say they are and gives a yes or
no decision.
 IDENTIFICATION- The system compares the given
individual to all the Other individuals in the database
and gives a ranked list of matches.
Identification
 All identification or authentication technologies operate
using the following four stages:
 Capture: A physical or behavioural sample is captured by
the system during Enrollment and also in identification or
verification process.
 Extraction: unique data is extracted from the sample and a
template is created.
 Comparison: the template is then compared with a new
sample.
 Match/non-match: the system decides if the features
extracted from the new Samples are a match or a non
match.
Implimentation
The implementation
of face recognition
technology includes
the following four
stages:
• Image acquisition
• Image processing
•Face image
classification
• Decision making
Image acquisition
Image Processing
 Images are cropped such
that the ovoid facial
image remains, and color
images are normally
converted to black and
white in order to
facilitate initial
comparisons based on
grayscale characteristics.
Distinctive characteristic
location
 All facial-scan systems
attempt to match visible
facial features in a
fashion similar to the
way people recognize
one another.
Template creation
Template matching
 It compares match templates against enrollment
templates.
 • A series of images is acquired and scored against
the enrollment, so that a user attempting 1:1
verification within a facial-scan system may have
10 to 20 match attempts take place within 1 to 2
seconds.
How Facial Recognition System
Works
Strengths
 It is the only biometric able to operate without user cooperation.
 Anywhere that you can put a camera, you can potentially use a facial
recognition system. Many cameras can be installed throughout a
location to maximize security coverage without disrupting traffic
flow.
 Face recognition systems can be installed to require a person to
explicitly step up to a camera and get their picture taken, or to
automatically survey people as they pass by a camera. The later
mode allows for scanning of many people at the same time
 Video or pictures can be replayed through a facial recognition system
for surveillance or forensics work after an event.
 Face scanning is not noticeable, can be done at a comfortable
distance and does not require the user to touch anything.
Weaknesses
 Changes in acquisition environment reduce
matching accuracy.
 Changes in physiological characteristics
reduce matching accuracy.
 It has the potential for privacy abuse due to
non co-operative enrollment and
identification capabilities.
 Such systems may be fooled by hats, beards,
sunglasses and face masks.
Applications
 Banking using ATM
 Voter verification
 Residential/office
Security:
 Security/Counterterroris
m
 Smart Security system
Application
 Apple iPhone X uses
Face id technology.
Applications:Video Demo
Conclusion
 For implementations where the biometric
system must verify and identify users
reliably over time, facial scan can be a very
difficult, but not impossible, technology to
implement successfully.
In National Security
Show of hands, who
believe this system
would work to catch
terrorists and criminals
Reference-
 Wikipedia
 Slide Share
 Google-for images
 Tutorialpoint.com
Face Recognition System/Technology

Weitere ähnliche Inhalte

Was ist angesagt?

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyusha2016
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 

Was ist angesagt? (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
face recognition
face recognitionface recognition
face recognition
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 

Ähnlich wie Face Recognition System/Technology

face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Biometric Face Recognition System
Biometric Face Recognition SystemBiometric Face Recognition System
Biometric Face Recognition SystemTime Labs
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...ijceronline
 

Ähnlich wie Face Recognition System/Technology (20)

face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Biometric Face Recognition System
Biometric Face Recognition SystemBiometric Face Recognition System
Biometric Face Recognition System
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
 

Kürzlich hochgeladen

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Kürzlich hochgeladen (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Face Recognition System/Technology

  • 1. Presented By-Rahul Singh CSE 3rd Year College-Nitra Technical Campus Ghaziabad Linkedin - https://www.linkedin.com/in/rahul-singh- 171b77156/ 
  • 2. Outline-  1. Introduction  2. Biometrics  3. History  4. Facial Recognition  5. Implementation  6. How it works  7. Strengths & Weaknesses  8. Applications  9. Conclusion  10. Refrences
  • 3. Introduction  Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.
  • 4. Biometrics  A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity.  Biometrics can measure both physiological and behavioral characteristics.  Physiological biometrics:- This biometrics is based on measurements and data derived from direct measurement of a part of the human body.  Behavioral biometrics:- this biometrics is based on measurements and data derived from an action
  • 6. What is face recognition system ?
  • 7.  A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing camaras and image capture Devices will work with no problems
  • 8. History  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair color and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition. 03/12/13 8
  • 9. Facial Recognition  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 10. Identification  All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioural sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 11. Implimentation The implementation of face recognition technology includes the following four stages: • Image acquisition • Image processing •Face image classification • Decision making
  • 13. Image Processing  Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics.
  • 14. Distinctive characteristic location  All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another.
  • 16. Template matching  It compares match templates against enrollment templates.  • A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds.
  • 17. How Facial Recognition System Works
  • 18. Strengths  It is the only biometric able to operate without user cooperation.  Anywhere that you can put a camera, you can potentially use a facial recognition system. Many cameras can be installed throughout a location to maximize security coverage without disrupting traffic flow.  Face recognition systems can be installed to require a person to explicitly step up to a camera and get their picture taken, or to automatically survey people as they pass by a camera. The later mode allows for scanning of many people at the same time  Video or pictures can be replayed through a facial recognition system for surveillance or forensics work after an event.  Face scanning is not noticeable, can be done at a comfortable distance and does not require the user to touch anything.
  • 19. Weaknesses  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to non co-operative enrollment and identification capabilities.  Such systems may be fooled by hats, beards, sunglasses and face masks.
  • 20. Applications  Banking using ATM  Voter verification  Residential/office Security:  Security/Counterterroris m  Smart Security system
  • 21. Application  Apple iPhone X uses Face id technology.
  • 23. Conclusion  For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.
  • 24. In National Security Show of hands, who believe this system would work to catch terrorists and criminals
  • 25. Reference-  Wikipedia  Slide Share  Google-for images  Tutorialpoint.com